CHAPTER 5 DIGITAL SAFETY AND
SECURITY
Objectives
Overview
1) Define the term, digital security risks, and briefly
describe the types of cybercriminals
2) Describe
various types of Internet and network attacks, and explain ways to safeguard
against these attacks
3) Discuss techniques to prevent unauthorized computer
access and use
4) Discuss how encryption, digital signatures, and
digital certificates work
5) Explain the ways that software manufacturers protect
against software piracy
6) Identify safeguards against hardware theft, vandalism,
and failure
7) Explain the options available for backing up
8) Identify risks and safeguards associated with wireless
communications
Digital Security Risks
Digital Security Risks : any event or action that could cause a loss of or
damage to a computer or mobile device hardware, software, data, information, or
processing capability
Computer Crime : Any
illegal act involving the use of a computer or related devices generally
Cybercrime : an online or
Internet-based illegal act
For example >> Hacker,
Cracker, Corporate spies, Unethical employees
Hacker
|
Cracker
|
Break the computer system
with ethics to test the weakness of the system.
|
Deliberately
breaks the system to bring damage and sabotage elements
|
Do not damage the system or destroy data
|
Unethical
|
|
Aggressive
and dangerous
|
Internet And Network Attacks
Malware : Malicious software
Firewall : Hardware and/or software that protects a network’s
resources from intrusion
Unauthorized Access And Use
Unauthorized Access
|
Unauthorized Access
|
The use of a computer or network without permission
|
the use of a computer or its data for unapproved or possibly illegal
activities
|
Organizations take several measures to help prevent
unauthorized access and use :
§ Acceptable use policy
§ Disable file and printer sharing
The computer, device, or network should maintain an
audit trail that records in a file both
successful and unsuccessful access attempts :
§ User name
§ Password
§ Passphrase
§ CAPTCHA
Biometric device : Authenticates a person’s identity by translating
a personal characteristic into a digital code that is compared with a digital
code in a computer
For example:
Ø Fingerprint reader
Ø Hand geometry system
Ø Signature verification system
Ø Iris recognition system
Digital Forensics : The discovery, collection, and analysis of evidence found on computers
and networks
Many
areas use digital forensics :
1)
Law enforcement
2)
Criminal
prosecutors
3)
Military
intelligence
Software Theft
Occurs when :
v Steals software media
v Intentially erases programs
v Illegally copies a program
Information Theft
Information theft : Occurs when someone steals personal or
confidential information
Encryption : A process of converting data that is readable by humans into encoded
characters to prevent unauthorized access
Digital signature : An encrypted code that a person, website, or
organization attaches to an electronic message to verify the identity of the
sender
Digital certificate : A notice that guarantees a user or a website is
legitimate
HARDWARE
THEFT, VANDALISM AND FAILURE
1)
Hardware theft : The act of stealing digital
equipment
2)
Hardware vandalism
: the act
of defacing or destroying digital equipment
To prevent this problem :
Hardware Theft and
Vandalism Safeguards
-
Physical access
controls (i.e, locked doors and windows)
-
Alarm system
-
Physical security
devices (i.e, cables and locks)
-
Device-trscking
apps
Hardware Failure
Safeguards
-
Surge protector
-
Fault-tolerant
computer
-
Uninterruptible
power supply (UPS)
Backing
Up – The Ultimate Safeguard
Backup : A duplicate of a file,
program, or media that can be used if the original is lost, damaged, or
destroyed
For example : Cloud storage
Ethics And Society
Computer ethics : The moral guidelines that govern the use of
computers, mobile devices, and information systems
Code of conduct : A written guideline that helps determine whether
a specification is ethical/unethical or allowed/not allowed
Information
Private
Information privacy refers to the right of individuals and companies to
deny or restrict the collection and use of information about them
Phishing is a scam in which a
perpetrator sends an official looking email message that attempts to obtain
your personal and/or financial information
Spyware is a program placed on a computer or mobile device without the user’s knowledge
that secretly collects information about the user and then communicates the
information it collects to some outside source while the user is online
Content filtering is the process of restricting access to certain
material on the Web
Comments
Post a Comment