![Page 1: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/1.jpg)
Computer Security
Spyware and Viruses and Theft, Oh My…
Chapter 11 –Discovering Computers 2009
![Page 2: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/2.jpg)
What is a computer security risk?Any event or action that causes loss of or damage to a computer system
Computer crime - Any illegal act involving a computertheft of hardware Software theft or piracy unauthorized access and useinformation theftCybercrime - Online or Internet-based illegal acts
System Failurepower surgeundervoltage (brownout or blackout)noise (unwanted signal)natural disasters (fires, floods, tornados)aging hardware
![Page 3: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/3.jpg)
Preventing Hardware Theft and Vandalism
Restrict physical accesslock doors and windows
use alarm systems
use cables that lock equipment to desk
use passwords, possessed object and biometric devices – don’t prevent actual theft, but renders computer useless if stolen
![Page 4: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/4.jpg)
How can you make your password more secure?
Longer passwords provide greater security
Mix words with numbers
Avoid obvious passwords, such as your birthdate
![Page 5: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/5.jpg)
What is software theft?
When you purchase
software, you do not own the
software; instead, you
become a licensed user
Software theft - Stealing media that contains software
Software piracy is unauthorized and illegal duplication of copyrighted software
![Page 6: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/6.jpg)
What is unauthorized access?
CrackerSomeone who tries
to access a computer or
network illegally
Use of computer or network without permission
HackerOnce used as a
complimentary word for a computer enthusiast
Now another wordfor cracker
![Page 7: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/7.jpg)
What is a personal firewall?
Software program that detects and protects personal computer and its data from unauthorized intrusions
Constantly monitors all transmissions to and from computer
Informs you of any attempted intrusions
![Page 8: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/8.jpg)
What is filtering software?
Can restrict access to specified Web sites
Some filter sites use specific words
Others filter e-mail messages and chat rooms
![Page 9: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/9.jpg)
What is an audit trail?
Records in a file both successful and unsuccessful access attempts to access a computer
Companies should document and explain to
employees policies regarding use of
computers by employees for personal
reasons
![Page 10: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/10.jpg)
What is a computer virus?
Potentially damaging program that affects computer negatively by altering way computer works
Segment of program code from some outside source that implants itself in computer
![Page 11: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/11.jpg)
What is the source of a virus?
Written by programmers
Some write viruses as challenge
Others write viruses to cause destruction or to slow Internet
![Page 12: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/12.jpg)
What are the ways viruses can be activated?
Opening infected file
Running infected program
Booting computer with infected floppy disk in disk drive
opening an email attachment that is infected
![Page 13: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/13.jpg)
What are signs of a virus infection?
![Page 14: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/14.jpg)
What are the three main types of virus?
Boot sector virusResides in boot sector of floppy disk or master boot record of hard disk
File virusAttaches itself to program files
Macro virusWhen you open document that contains infected macro, virus loads into memory
![Page 15: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/15.jpg)
How can you protect your system from a macro virus?
Set macro’s security level in all applications that allow you to write macros
At medium security level, warning displays when you attempt to open document that contains macro
![Page 16: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/16.jpg)
Worms and Trojan Horses
A worm is a program that copies itself repeatedly
A Trojan Horse looks like a legitimate or hides within another program
Viruses, worms and Trojan Horses use computer resources and can damage files and software
![Page 17: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/17.jpg)
What does an anti-virus program do?
Detects and identifies viruses
Inoculates existing program files
Removes or quarantines viruses
Creates rescue disk
These programs need to be updated to keep up with the new viruses being written.
![Page 18: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/18.jpg)
How does an anti-virus program scan for a virus?
Scans forPrograms that attempt to modify boot program, operating system, and other programs that normally read from but not modified
Files you download from the Web
E-mail attachments
Files you open
All removable media, such as a floppy
Looks for known virus signatures
![Page 19: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/19.jpg)
How does an anti-virus program inoculate a program file?
Antivirus program recordsfile size and creation dateand uses this information to detect if a virus tamperswith inoculated program file
![Page 20: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/20.jpg)
What two types of virus are more difficult to detect?
Polymorphic virus
Modifies its own code each time it attaches itself to another program or file
Cannot be detected by its virus signature because
code pattern in virus never looks the same
Stealth virus
Infects a program file, but still reports size and creation date of original, uninfected
program
Cannot be detected by inoculation file
![Page 21: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/21.jpg)
What does an anti-virus program do once it detects a virus?
Removes virus if possible
Quarantines infected file in folder on hard disk
![Page 22: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/22.jpg)
What should you do if a virus infects your system?
Remove virus
If you share data with other users, then immediately inform them of virus infection
![Page 23: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/23.jpg)
How can you stay informed about viruses?
Several Web sites publish list of virus alerts and virus hoaxes
Virus hoaxE-mail message
that warns you of non-existent virus
![Page 24: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/24.jpg)
What is Spyware?
Program placed on computer without user's knowledge
Secretly collects information about user
Can enter computer as virus or as a result of installing new program
![Page 25: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/25.jpg)
What is a cookie?
Track user preferences
Small file that Web server stores on your computer
Typically contains data about you
Web site can read data only from its own cookie file
Some Web sites sell or trade information stored in your cookie to advertisers
Set browser to accept cookies automatically, or prompt you if you wish to accept cookie, or disable cookie use
Many Web sites do not allow you to access features if you disable cookie use
a cookie manager is a Software program that selectively blocks cookies
Track how regularly you visit site and
Web pages you visit when at
site
Used to send SPAM
![Page 26: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/26.jpg)
What is an electronic profile?
Merchants sell contents of their
databases to national marketing firms and Internet advertising firms
Data is collected every time you fill out form or click advertisement on
Web
Data combined with information
from public sources
Marketing firms sell your
electronic profile to any company that requests it
![Page 27: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/27.jpg)
Spam – unsolicited email message
Phishing – scam using an official-looking email message to get personal and financial information
Spoofing – make network believe that an IP address appear legitimate to gain access
Back door – a means of accessing a program without going through security controls
Zombie – using someone else’s computer to attack other computers
![Page 28: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/28.jpg)
How do Web browsers provide secure data transmission?
Many Web browsers use encryption
Web site that uses encryption techniques to secure its data is known as secure sitesecure site
Use digital certificates with security protocol
Digital certificate
Notice that guarantees user or
Web site is legitimate
Also called public-key certificate
![Page 29: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/29.jpg)
What is a digital signature?
Encrypted code that person, Web site, or company attaches to electronic message to verify identity of message sender
Code usually consists of user's name and hash of all or part of message
![Page 30: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/30.jpg)
What is encryption?
PlaintextUnencrypted, readable data
Process of converting readable data into unreadable characters to prevent
unauthorized access
Used to transmit files over Internet
encryption software
CiphertextThe encrypted (scrambled) data
encryption key
PlaintextUnencrypted, readable data
![Page 31: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/31.jpg)
![Page 32: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/32.jpg)
What is a secure server?Prevents access to system by unauthorized users
Used for transactions involving credit card information
![Page 33: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/33.jpg)
What is Secure Sockets Layer (SSL)?
https indicates secure connection
Provides private-key encryption of all data that passes betweenclient and server
![Page 34: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/34.jpg)
What is Pretty Good Privacy (PGP)?
One of most popular e-mail digital encryption programs
Freeware for personal, non-commercial users
Uses public-key encryption scheme
![Page 35: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/35.jpg)
What is a surge protector?
Smoothes out minor noise, provides stable current flow, and keeps over-voltage from reaching computer
Amount of protection proportional to its cost
Also calledsurge suppressor
Uninterruptible power supply (UPS)-Surge protector and battery that can provide power during temporary loss of power
![Page 36: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/36.jpg)
What is a rescue disk?
Removable disk that contains uninfected copy of key operating system commands and startup information
Upon startup, rescue disk finds and removes boot sector virus
![Page 37: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/37.jpg)
How do the types of backup compare?
![Page 38: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/38.jpg)
(continued)
![Page 39: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009](https://reader034.vdocuments.us/reader034/viewer/2022050301/5f6a339189795929706b60d8/html5/thumbnails/39.jpg)